How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

21/11/2023 0 Comments 0 tags

Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits

21/11/2023 0 Comments 0 tags

The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits. “Once Kinsing infects a system, it deploys

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

21/11/2023 0 Comments 0 tags

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data. “Using

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

21/11/2023 0 Comments 0 tags

The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto

Play Ransomware Goes Commercial – Now Offered as a Service to Cybercriminals

21/11/2023 0 Comments 0 tags

The ransomware strain known as Play is now being offered to other threat actors “as a service,” new evidence unearthed by Adlumin has revealed. “The unusual lack of even small variations between

New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks

21/11/2023 0 Comments 0 tags

A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest data from several email clients and nearly 40 web browsers. “ZPAQ

NetSupport RAT Infections on the Rise – Targeting Government and Business Sectors

20/11/2023 0 Comments 0 tags

Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. “The delivery mechanisms for the NetSupport RAT encompass fraudulent updates, drive-by downloads,

DarkGate and PikaBot Malware Resurrect QakBot’s Tactics in New Phishing Attacks

20/11/2023 0 Comments 0 tags

Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan. “These include hijacked email threads as

Product Walkthrough: Silverfort’s Unified Identity Protection Platform

20/11/2023 0 Comments 0 tags

In this article, we will provide a brief overview of Silverfort’s platform, the first (and currently only) unified identity protection platform on the market. Silverfort’s patented technology aims to protect

Why Defenders Should Embrace a Hacker Mindset

20/11/2023 0 Comments 0 tags

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly